ceph 16.2.10+ds-1 source package in Debian
Changelog
ceph (16.2.10+ds-1) unstable; urgency=high * New upstream hotfix release: - CVE-2022-0670: Users who were running OpenStack Manila to export native CephFS, who upgraded their Ceph cluster from Nautilus (or earlier) to a later major version, were vulnerable to an attack by malicious users (Closes: #1016069). - A regression made it possible to dereference a null pointer for for s3website requests that don’t refer to a bucket resulting in an RGW segfault. * Add fix-FTBFS-include-memory.h.patch to address FTBFS under GCC 12. -- Thomas Goirand <email address hidden> Wed, 27 Jul 2022 09:30:47 +0200
Upload details
- Uploaded by:
- Ceph Packaging Team
- Uploaded to:
- Sid
- Original maintainer:
- Ceph Packaging Team
- Architectures:
- any all
- Section:
- admin
- Urgency:
- Very Urgent
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
ceph_16.2.10+ds-1.dsc | 8.0 KiB | 08af6897f9d540ba2dbd535ccfe3c5967742b5e45fdb411de08d2b588b9b2f46 |
ceph_16.2.10+ds.orig.tar.xz | 103.6 MiB | d7edf185fbfbc87d98c8a1a374588eb025d9abe29a349fb50988ca62974030b1 |
ceph_16.2.10+ds-1.debian.tar.xz | 115.1 KiB | 6d4263b6491044b0e6ec060378827179e87cf3508c015787d5b6a224521068f2 |
No changes file available.